About your Search

20121027
20121104
Search Results 0 to 2 of about 3
with the technology before it's as secure as it probably should be. charlie has given some terrific talks about the incentive structures for software makers and whether or not they're properly in balance to make sure that they're secure with their software before they release it. but i'll let him speak for himself on that. >> host: well, mr. miller, if you would speak to that. >> guest: sure. so we're in a situation where we all run code that was written by a vendor like microsoft or apple or cisco or whoever. um, and the problem is it's very difficult to write secure code, code that's perfect with no vulnerabilities. and it's hard to measure whether a code is secure. so even an expert like myself, it's very difficult for me to tell you whether if given two programs, which one is more secure than the other. so it's hard to measure, and people don't want to necessarily pay for that. so we all want to buy the latest gadget, the latest iphone or whatever, and we don't really think to ourself how secure is it? maybe i shouldn't buy it because it's not secure. so companies, you know, they're out to
they rushed forward with the technology before it is as secure as it probably should be. charlie has given some terrific talks about the incentive structures of four software makers, -- for the software makers, and whether they are properly in balance with making sure the software is secure. but i will let him speak for that. f >> mr. miller, if you would speak to that? >> sure, we are in a situation where we all run code that was written by a vendor like microsoft or cisco or whomever, and the problem is is very difficult to write secure code. whetherhard to measure code is secure, so even an expert like myself, it is difficult for me to tell you given to programs which is more secure than the other. it is hard to measure and people don't want to necessarily pay for that. we all want to buy the latest gadget, the iphone that comes out or whatever, and we don't think to ourselves, how secure is this, maybe i should not by this because it is not secure. so companies, they are out to make money and that is what they are therefore, so they want to push products out the door, beat competitors,
the companies that are making technology and writing the code to shoulder the full cost, which i would argue involves creating a secure product. >> host: charlie miller what about when it comes to social media and the sharing of information that we as consumers do with google, facebook etc. etc.? does that lend itself to less secure networks? >> guest: it doesn't affect the network per se but what it does is, it puts a lot of our information and some of that prior information out there so if you never connected to the internet no one would know what you would do doing, if you are dating someone but with facebook information is there. it's still out there on a server somewhere so some back i could get to it if you wanted so i think if you consider that you know it well ago, no one would ever agree to carry around a tracking device, but now we all carry around cell phones and no one would have ever let anyone read your e-mail but right now a lot of us use e-mail and all of our e-mails are stored on it server at google so it's interesting we as a society of given our information out and whether
Search Results 0 to 2 of about 3